Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-h6mj-p863-8p6q

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Directory traversal vulnerability in the XML Server in IOServer before 1.0.19.0, when the Root Directory pathname lacks a trailing \ (backslash) character, allows remote attackers to read arbitrary files or list arbitrary directories via a .. (dot dot) in a URI.

Directory traversal vulnerability in the XML Server in IOServer before 1.0.19.0, when the Root Directory pathname lacks a trailing \ (backslash) character, allows remote attackers to read arbitrary files or list arbitrary directories via a .. (dot dot) in a URI.

EPSS

Процентиль: 92%
0.0854
Низкий

Дефекты

CWE-22

Связанные уязвимости

nvd
больше 13 лет назад

Directory traversal vulnerability in the XML Server in IOServer before 1.0.19.0, when the Root Directory pathname lacks a trailing \ (backslash) character, allows remote attackers to read arbitrary files or list arbitrary directories via a .. (dot dot) in a URI.

EPSS

Процентиль: 92%
0.0854
Низкий

Дефекты

CWE-22